With the introduction of Active Directory more than 20 years ago, the Kerberos protocol provided a new approach to security and identity management. But new, sophisticated attack methods and the shift to the cloud have left Kerberos—an authentication protocol used to verify the identity of a user or host—a highly vulnerable target.
In this webcast, Elad Shamir and Sean Deuby of Semperis will provide guidelines for IT and security teams in guarding Kerberos from cyberattacks:
• How the Kerberos authentication protocol works
• Common Kerberos attack methods
• How to combat Kerberoasting attacks
• Mitigating Silver Ticket and Golden Ticket attacks
• Understanding and mitigating the dangers of Kerberos unconstrained delegation and authentication coercion
Attendees are eligible to receive 1 CPE credit.